Talk:DNS cache poisoning
From Wikipedia, the free encyclopedia
[edit] Not Clear
The explanation about the poisoning techniques is not clear. Splendour 07:02, 28 June 2006 (UTC)
An example would help greatly. Nikle-on-wikipedia 17:59, 29 December 2006 (UTC)
[edit] Invalid Information
Under prevention and mitigation it is stated that end-to-end validation can be performed once a connection is setup. This isn't entirely true because DNS uses UDP for many of its queries which is a connectionless protocol there is no transport layer connection set up. However, public/private key transaction signatures can be used to validate queries.

